It appears that you're running an Ad-Blocker. This site is monetized by Advertising and by User Donations; we ask that if you find this site helpful that you whitelist us in your Ad-Blocker, or make a Donation to help aid in operating costs.

Hey wassup! I have read many books now and a lot of tutorials. I have grown but I have a question. I know a hacker isn't someone that breaks and destroys computers but what re the multiple uses of ip address'? And I have AOL and AIM but I NEED HELP! FOr example I get an IP address I found the open port.........WHAT ELSE!!!! Please dont be a jackass because you gotta be nice to newbies This is kinda hard with school, gangs, my parents, etc. PLEASE HELP ME

ok, let's have a bit of harmless fun and ports shall we? Let's explore port 25. Port 25 is the SMTP port. In english, that means you send email through that port. I see you have an AOL account yes? well then, let's send an email to your aol account.

open up telnet and connect tomailin-01.mx.aol.com 25

mailin-01.mx.aol.com is one of their SMTP servers and port 25 is the port providing the service.

After you've connected type the following (the ## lines are just descriptions of the commands)

## First we identify ourselvesHELO localhost

## Now we specify the account it was sent from. this can be just about anythingMAIL FROM:

## This is mailbox the email is being sent toRCPT TO:

## Now we indicate that we wanna start writing the emailDATA

## Now we type the headers and the email. You MUST end it with a . on a blank lineFrom: Telnet boy To: DaMaRiS Subject: This is my telnet test!

/me enters friendly-newb-modeThe use of an ip is to identify computers while connecting to other computers, kind of like a numerical name given to your computer that other computers can identify you as. Each is individully unique, given to your machine from your isp, as you probably already know. IP isn't a very complicated thing to understand, in my opinion, TCP, on the other hand, is a bit more complicated. If you're really interested about this sort of stuff then you probably already know from reading tuts that tcp has four layers: 1: Network Access Layer; 2: Internet Layer; 3: Transport Layer; and 4: Application Layer. ... just food for thought. http://www.good-stuff.co.uk/useful/portfull.htmlThis is a pretty good tcp/udp port list. It will tell you what ports are used for what, if you don't already know. You can't get this kind of knowledge just anywhere

What do gangs have anything to do with ip addresses and open ports? ... just curious.

Well number one dont tell anyone but i'm in a gang and its a lot of work. Sty up till 4 am all the time. Hardly nay time to study for school and less to be a hacker. And i have IP Tools and I go to telnet but it never finishes loading eventually i quit.

who are we going to tell. You just told hundreds of people all around the world you are in a gang. What did you expect? That somebody may call up your parents and let them know their darling child is in a gang?

Dude, SR wasn't kidding. UGN get something like 200k unique hits a month. So let's say this topic is active for a week, and only half of the poeple read this post, that's still like 25000 people you just told that you are in a gang. NEVER post anything on here you wouldn't shout in public at the top of your lungs, because here a lot more people will hear you.

wait a minute, you mean it wasnt perfectly obvious to you he was in a gang at the beginning of this topic why else would gangs make it difficult for him to hack its not like they come knockin down your door while your online...anyway my two sense quit the gang unless your the leader no one ever got recognized for being a henchman then again your not really a henchman either they get paid for their services

Just because I dont care doesn't mean that I don't understand.-Homer Simpson

Guys, i think that what he really wanted to know is how to start hacking with IP's and shit stuff like that, but there is another topic here on this board in which the same question was asked or at least close to that and i remember that we've explained it pretty good so no need to ask the same thing again, i believe this is the most asked question in every board in the internet:

-"I know the IP of the computer, how can i hack into it ?" and stuff like that.

That was explained, DaMaRiS no offense, i'm not saying you're a newb or anything else, if you are there's nothing to be shy from, nobody is born an EXPERT, everyone learns to achieve knowledge. You said you read a lot of tutorials and so on, well i suggest you continue...

Now asteos explained to you how TCP/IP layers, but i'd suggest you to learn first about the OSI layers which are maybe older but they're much easier to undestand the full things how it works, coz things there are more separated and you've got more details. Here i'll give you a short description of the OSI reference model.

I can't stand the OSI model. It means nothing to me when I packet sniff. So here I'll explain "briefly" and practically what TCP packets are and how they travel.

Now like the OSI, a packet is composed of several layers. The top of this data packet is the network information. It includes the sender's MAC address (the ID for their network card) and the reciever's MAC address. It also includes the network type (token ring, ethernet, wireless of some sort, etc)

Next comes the IP layer which is usually 20 bytes long. It contains the sender's IP address, and the recievers IP address. It also includes various other information useful for the ROUTING of the packet - that is, packet transfer information. It is the IP which identifies a computer on the internet, and from which it is determined where the packet has come from, and where it will go. The sender's IP is included so that the recieving computer knows to whom it should reply. Kind of like email. You need a return address to get a reply.

Next comes the TCP or UDP or ICMP layer. The TCP layer is also usually 20 bytes and is used when you make a connection between two computers. Within the TCP, UDP and sometimes ICMP layers the port information is stored. The port is what a program listens on for a connection from another computer. There are ports from 1 to 65535 which may be used for communication. The TCP layer also includes other information which says what kind of packet it is. There's the connection request packet (SYN) an acknowledgement packet (ACK) and a packet which indicates that the user wishes to close the connection (FIN).

Now finally we come upon the data layer. The data layer is what programs use to communicate. When you open telnet to connect to another machine, the text you send is placed in this layer. Every program has a language that you must speak for it to understand. Above in my email example, I had to enter the commands just the right way for the email program on the other computer to understand me. standardization made it so that almost every time, if you connect to port 80 - you must speak the HTTP language (to ask for webpages and retrieve them). If you connect to port 21 you must speak the FTP language to login and move about on the remote file system.

To be a good hacker, you must learn as many languages "protocols" that you can so that you know how to talk to all these servers out there and perhaps trick (exploit) them into doing things for you they're not supposed to do.

Ok number one i am not a HE i am a SHE and well i dont want to hack lyk destroy ok cuz i dunno.. i want to be useful not just be a name on a wall. You know also help otu with projects and stuff. Anyways you guys helped thank you. I'm otu 4 now!

Both the OSI model and the TCP/IP model have their uses. If you want to know how the Internet really works from a binary perspective look at the TCP/IP model. It is pretty self-explainitory. I instead would like to talk about the OSI model as it relates to security.

Two basic rules apply when using the OSI model for security: the model does not only apply to the network, and security is applied in layers. The few examples I give here will barely scratch the surface of this topic. Many books and careers are based on this design.

I've been apart of a group that busted a child porn ring. Was two brothers in San Francisco. They were some ethnic descent. I can't remember which though. They ran a printing shop. They lived upstairs from their business. The server was hosted in their house.

What the hell are you talking about? Are you extremely ignorant Damaris? All you do is talk about being is some gang and then say that people should bring down gay support groups. Just because you don't agree with something doesn't mean you go trash it if it's not harming anyone else. I'm not gay, but that doesn't mean I should go around trashing gay people because I'm not gay or if I didn't agree with it. Everyone on this site always talks about freedom of knowledge and so on, so if everyone's not just bullshitting and you want to be a real hacker like some of the people on this board are, then you should realize that gay people have the right to freedom of opinion and so on also. You should stop being so ignorant.

i'll give you the highest rating for that speech.you said that good Mornse.. I guess some people don't know shit and when you try to help em, they act in a stupid way that no one undestands what the hell are they trying to prove.

Ok u both wron aight gay people are stupid. They should all burn in hell because wat gay people do is unhuman. Gay support groups shouldn't exist. And y the hell do u think only a guy and girl can have sex and then have kids. U can't have kids w 2 girls or 2 guys.